Internet Protocol Hierarchy & Cybersecurity Threats for Computer Networks

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

Internet

Designed using a layered architecture.

2
New cards

Physical Layer

Handles the physical wires and 'to/from' addresses.

3
New cards

Computing Device

Any machine that can run a program (Smart fridge, sensor, laptop).

4
New cards

Path

The sequence of directly connected computing devices that begins at the sender and ends at the receiver.

5
New cards

Routing

The process of finding a path. It is not predetermined.

6
New cards

Redundancy

Having multiple paths between two devices. If we have n paths, the system is Fault Tolerant.

7
New cards

IP (Internet Protocol)

The fundamental addressing system.

8
New cards

IPv4

Uses 32 bits (2^32 addresses).

9
New cards

IPv6

Uses 128 bits (2^128 addresses).

10
New cards

TCP (Transmission Control Protocol)

Breaks data into packets, numbers the packets, reassembles them at the end, and sends an Acknowledgement (ACK) back to the sender.

11
New cards

UDP (User Datagram Protocol)

Sends packets without checking for errors or order. It is 'Best Effort' delivery.

12
New cards

HTTP/HTTPS

The protocol for the World Wide Web. HTTPS uses TLS/SSL to encrypt the connection.

13
New cards

Cybersecurity

The protection of computer systems and networks.

14
New cards

Malware

Any software intended to damage or disable computers.

15
New cards

Virus

A malicious program that requires human action to spread.

16
New cards

Worm

Similar to a virus, but it self-replicates and spreads across networks automatically.

17
New cards

Trojan Horse

A program that looks useful but hides a malicious payload inside.

18
New cards

Ransomware

Encrypts a user's files and demands payment to unlock them.

19
New cards

Spyware

Secretly monitors user activity.

20
New cards

Phishing

Using social engineering to trick people into giving up PII.

21
New cards

DDoS (Distributed Denial of Service)

An attacker uses a Botnet to flood a server with requests until it crashes.

22
New cards

Man-in-the-Middle (MitM)

An attacker intercepts communication between two parties to steal data.

23
New cards

Symmetric Encryption

One secret key for both encryption and decryption.

24
New cards

Asymmetric (Public Key) Encryption

Two keys (Public and Private) used for secure communication.

25
New cards

Certificate Authority (CA)

Organizations that issue Digital Certificates to prove website authenticity.

26
New cards

Multi-Factor Authentication (MFA)

Requiring two or more pieces of evidence to log in.

27
New cards

Digital Divide

The gap in access to tech due to various factors.

28
New cards

Net Neutrality

The principle that ISPs must treat all data equally.

29
New cards

Copyright

Ownership of a creative work.

30
New cards

Creative Commons

A license that lets you share your work with specific rules.

31
New cards

Open Source

Software where the source code is public.

32
New cards

Open Access

Making research/journals free to the public.

33
New cards

Bit Rate

The speed at which a system can transmit bits.

34
New cards

Metadata

Data about data.

35
New cards

Algorithmic Bias

When a program creates unfair outcomes.